CHALLENGES TO SECURITY IN SPACE

January 24, 2019

Space-based capabilities provide integral support to military, commercial, and civilian applications. Longstanding technological and cost barriers to space are falling, enabling more countries and commercial firms to participate in satellite construction, space launch, space exploration, and human spaceflight. Although these advancements are creating new opportunities, new risks for space-enabled services have emerged. Having seen the benefits of space-enabled operations, some foreign governments are developing capabilities that threaten others’ ability to use space.

Spotlight

FoxGuard Solutions, Inc.

"FoxGuard Solutions provides cyber security, regulatory compliance and industrial computing solutions for critical infrastructure entities and control system vendors. As a wholly-owned subsidiary of CCS-Inc., we are an operational technology (OT) company that delivers reliable, secure, and configurable solutions to solve technology and compliance challenges. FoxGuard has 33 years of experience in the design, manufacture, and life-cycle management of industrial Human Machine Interface (HMIs), Historians, and SCADA devices to offer field-tested solutions created specifically for Industrial Control System (ICS) environments. FoxGuard has over 10 years of cyber security consultation and architecture design expertise in the areas of vulnerability scanning, penetration testing, incident response, disaster recovery and continuing operations planning, and vulnerability mitigation."

OTHER WHITEPAPERS
news image

Project Blackfin: Automated Breach Detection Using Intelligent Agents

whitePaper | December 4, 2019

This paper describes a distributed anomaly detection approach designed to accurately track actions performed by adversaries across a network. The illustrated approach involves running multiple machine learning models on both endpoints and the network as well as on a centralized backend, and includes communication and replication of learned states between these models.

Read More
news image

INDUSTRIAL CYBER RISK MANAGEMENT

whitePaper | May 21, 2021

Critical infrastructure owners and operators have managed industrial risk for hundreds of years. This risk is usually measured in impact to health, safety, and reliability. As these industrial systems become increasingly digitized, so does the risk. What were once seen as isolated, manual processes have become reliant on communication networks and digital devices.

Read More
news image

White Paper on Cyber Security Securing Video Surveillance Devices to Close Network Vulnerabilities

whitePaper | February 19, 2020

We live in an increasingly connected world, where more and more devices and systems are networked and shared with other systems. Convenience is a main driver behind this trend, as people have come to expect the ability to connect to and control devices and systems anywhere, anytime. However, there is a downside to the unprecedented level of convenience provided by the growing number of networked devices, namely increased security risk. Because each device is an endpoint for networks, they introduce the potential to become entry points for hackers and others with malicious intents. In fact, in many of the most high-profile data breaches that have occurred recently, hackers were able to access corporate networks through POS, HVAC and other networked systems that failed to provide an adequate level of security to prevent these types of breaches.

Read More
news image

Scenarios for the Future of Cybercrime - White Paper for Decision Makers

whitePaper | January 28, 2020

Project 2020 is an initiative of the International Cyber Security Protection Alliance (ICSPA). Its aim is to anticipate the future of cybercrime, enabling governments, businesses and citizens to prepare themselves for the challenges and opportunities of the coming decade. It comprises a range of activities, including common threat reporting, scenario exercises, policy guidance and capacity building.

Read More
news image

Network Traffic Analysis (NTA): A Cybersecurity ‘Quick Win’

whitePaper | February 27, 2020

According to research from ESG and the Information Systems Security Association (ISSA), 91% of cybersecurity professionals believe that most organizations are either extremely or somewhat vulnerable to a significant cyber-attack or data breach.1 This level of cyber-risk demands immediate attention and action from CISOs, CIOs, and business executives. As a result, 62% of organizations plan to increase cybersecurity spending in 2020.2 Here’s the problem: Increasing security budgets alone isn’t enough. CISOs need quick and easy wins that can greatly bolster security efficacy and streamline operations without demanding massive projects and vast resources. There is a lot of work ahead. This white paper concludes.

Read More
news image

Cyber Security for Business

whitePaper | December 17, 2019

At CGI, cyber security is part of everything we do. For more than 40 years, we have helped clients manage complex security challenges with a business focused approach – protecting what is most valuable to them. As our economy becomes even more digital in nature, securing our organisations against cyber-attacks and data breaches has become one of the most important business issues facing senior management.

Read More

Spotlight

FoxGuard Solutions, Inc.

"FoxGuard Solutions provides cyber security, regulatory compliance and industrial computing solutions for critical infrastructure entities and control system vendors. As a wholly-owned subsidiary of CCS-Inc., we are an operational technology (OT) company that delivers reliable, secure, and configurable solutions to solve technology and compliance challenges. FoxGuard has 33 years of experience in the design, manufacture, and life-cycle management of industrial Human Machine Interface (HMIs), Historians, and SCADA devices to offer field-tested solutions created specifically for Industrial Control System (ICS) environments. FoxGuard has over 10 years of cyber security consultation and architecture design expertise in the areas of vulnerability scanning, penetration testing, incident response, disaster recovery and continuing operations planning, and vulnerability mitigation."

Events